What are three major features of StealthWatch? (Choose Three)
A. Malware clustering
B. Threat-based anomaly detection
C. Netflow monitoring
D. Data Loss Prevention
E. Realtime sandboxing
F. Forensic investigation
What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)
A. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayered approach.
B. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business outcomes.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
E. An effective security solution portfolio can help customers overcome ever-growing security challenges.
Which too products are involved in discovering classifying and verifying profiles? (Choose Two)
A. Industrial Network Director
B. Duo
C. Cisco Security Connector
D. Advanced Malware Protection
E. Identity Services Engine
Which statement best embodies trust-centric security?
A. Protect users from attacks by enabling strict security policies.
B. Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.
C. Verify before granting access via identity-based policies for users, devices, apps, and locations.
D. Verify before granting access via MDM software.
In the Campus NGFW use case, which capability is provided by NGFW and NGIPS?
A. Flexible AAA Options
B. Identity Services Engine
C. Differentiated Mobile Access
D. High throughput maintained while still protecting domains against threats
What are two ways that Cisco helps customers secure loT deployments? (Choose Two)
A. secure remote access
B. segmentationandvisibility
C. cross-architecture automation
D. network analysis
E. limited access points
What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?
A. Security vSS. availability
B. Malfunctions vs. output
C. Innovation vs. manufacturing
D. Hackers vs. safety
Which two attack vectors are protected by Visibility and Enforcement? (Choose Two)
A. Mobile
B. Email
C. Web
D. Endpoints
E. Cloud
What are three security blind spots that must be addressed? (Choose Three)
A. Data
B. Applications
C. IT
D. Networks
E. Workloads
F. Email
Which management platform helps strengthen security posture by enabling uniform policy deployment, uncovering and remediating unplanned changes, and extends protection to the application layer?
A. Firepower Management Center
B. Cisco Defense Orchestrator
C. Firepower Policy Manager
D. Firepower Device Manager